The AI-powered unified PSA-RMM platform for modern MSPs.
Trusted PSA-RMM partner of MSPs worldwide
SuperOps.ai is the only PSA-RMM platform powered by intelligent automation and thoughtfully crafted for the new-age MSP. The platform also helps MSPs manage their projects, clients, and IT documents from a single place.
Learn More
Get full visibility and control over your tasks and projects with Wrike.
A cloud-based collaboration, work management, and project management software
Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
Application proxy toolkit which inherits the ideology of TIS fwtk and maintains API backwards compatibility. The design goal is to make it simple yet powerful; no performance hacks allowed in the code and library dependencies are reduced to minimum.
...The TPM chip will enable you to use hardware to securely store and protect your keys and personal data. See also theTrouSers project.
This driver is integrated into the mainline Linux Kernel - code downloads on this page are only for historical reasons.
Latest Code can be found at:
https://github.com/PeterHuewe/linux-tpmdd
Patchwork:
https://patchwork.ozlabs.org/project/tpmdd/list/
Software to retrieve password of administrative system users stored in a MySQL database, designed for Nagios to access servers via expect or via SSH when you have not the Public key. Not exclusive to Nagios, but very desirable to sysadmins.
...It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable remote daemon and an interactive attack assistant.
*** Hyenae is back ***
Hyenae will be continued here: https://sourceforge.net/p/hyenae-ng
This program is used as a tool to check for ASCII code and strip it out to a new file to recover documents that got corrupted or find hidden data in viruses that contain text by the virus writer or spies puting comments in images or other files.
LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. The source code is hosted at https://github.com/ironbee/libhtp
A suite of source and binary programs to test the capabilities of code analysis tools. A reference implementation of x86 binary analysis in C# is also included.
Project Planning and Management Software | Planview
Connect programs, projects, resources, and financials with business outcomes using portfolio management software from Planview.
Planview® Portfolios enables enterprises to accelerate strategic execution by seamlessly integrating business and technology planning, optimizing resources, and leveraging the power of embedded AI — Planview Anvi™ — to deliver breakthrough products, services, and customer experiences. This unified approach aligns strategy with execution, driving enhanced business performance across the organization.
fm (file masker) is an easy-to-use command line cryptographic tool that's small, portable across operating systems, quite secure for most purposes, and licensed to you along with its source code under the gpl.
Portscan is a simple TCP port scanner (connect scan, similar to nmap -sC).
It is implemented with threads for better speed.
Please see the code and review it. Criticism is more than welcome.
Helps needed to make it robust.
For system user to take backup of any confidential file(it may be code/important document)as it may contain content not meant for the others to view or the system may crash.We will be securing the backup of selected files at regular intervals of time.
Brute is a brute force hash cracker, it allows the user to specify how many threads he want running simultaneously. It is fast, and modular, all the hash algorithm dependent code lies in a module (a shared library). Modules available: MD5; SHA256; SHA512
The Memory Encryption and Transparent Aegis Library (METAL) functions as a shim library, allowing applications to transparently hide memory from rogue applications. It can be used with legacy applications without code modification.
POLUS, a software maintenance tool capable of iteratively evolving running software into new versions, aims to retain backward binary compatibility, support for multithread software and recover already tainted state of running software with low overhead.
This software is a set of tools that hides C source code in txt files. Also the software is able to restore the txt files to C source code again. This work is based on the tool c2txt2c by Leevi Martilla. Csteg needs a book file in txt format to hide C so
Deobscufates .NET assemblies, primarily by rearranging IL code (basic block reordering) and removing junk.
Designed to be modular, it is built from reusable pieces.
The ELF-Encrypter program suite is a collection of programs to encrypt your ELF binaries using various algorithms. GnuPG is required in order to use some encryption techniques.
The suite also contains programs to inject code into ELF binaries.
Polydish is a polymorphic Internet server capable of accepting pluggable protocols (written in Python or Ruby), and can thereby serve any type of content imaginable. The backend code is a fast, secure, C-based server, employing thread pools and OpenSSL.
Gate Guardian is a library of C/C++ functions that can be used to avoid common security problems when a process forks or is forked from a parent process, or runs / is run by an external program. The code is meant to be portable across many UNIX variants.
siggen is a cool email signature generator for encrypted ansi c (confused), brainf*ck, ... signatures. Use it in combination with vi(m), emacs, mutt, pine, or what ever. (tested on Solaris, Linux and Windoze). Optimized only for geeks :-)
...You can monitor specific
packets to/from network interfaces, internet protocol addresses
and also define specific filters for protocol, port and flag
properties of a packet. Output can be directed to database,
p
...It supports functionality/algorithms that are supported by libgcrypt, including Symetric Ciphers (3DES, AES, Twofish, Blowfish), Cryptographic Hashing (MD5, SHA1, RIPE-MD160), P